Traceability systems have changed the way food safety is managed and data is stored. Blockchain tracking services now provide customers with an infrastructure that allows them to easily access data online. However, there are limitations to these new capabilities, such as a lack of transparency and the existence of privacy and security challenges. Additionally, as the need for more agile, private, and traceability secure data solutions continues to grow exponentially, rethinking the current structure of blockchain agricultural traceability is mission-critical for a country. By leveraging and building upon blockchain's unique attributes, including tamper-evident, security hash crypto-data, and distributed ledger, we have proposed a prototype that allows traceability data to be reliably stored via blockchain while simultaneously being secured, with completeness auditing to enhance credibility. The result, the trusted auditing chain (TA chain), is a flexible solution that assures data security and solves challenges such as scalability and privacy-preserving. The TA chain works through Schnorr-style non-interactive Zero-knowledge proof to support security automatical choose privacy augmented. In addition, The TA chain can audit more than 1000 transactions within 1ms, and its error stabilizes below the 250 μs, which proves a security and fair traceability system to assure that data is distributed and reliably, and provably audited.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9668534PMC
http://dx.doi.org/10.1016/j.heliyon.2022.e11477DOI Listing

Publication Analysis

Top Keywords

stored blockchain
8
security
6
traceability
6
data
6
trusted-auditing chain
4
chain security
4
blockchain
4
security blockchain
4
blockchain prototype
4
prototype agriculture
4

Similar Publications

Within the framework of 6G networks, the rapid proliferation of Internet of Things (IoT) devices, coupled with their decentralized and heterogeneous characteristics, presents substantial security challenges. Conventional centralized systems face significant challenges in effectively managing the diverse range of IoT devices, and they are inadequate in addressing the requirements for reduced latency and the efficient processing and analysis of large-scale data. To tackle these challenges, this paper introduces a zero-trust access control framework that integrates blockchain technology with inner-product encryption.

View Article and Find Full Text PDF

Blockchain Technology: Overview and Applications in Radiology.

AJR Am J Roentgenol

January 2025

Loma Linda University School of Medicine, Division of Vascular Surgery, Department of Surgery, 11234 Anderson St., Loma Linda, CA 92354.

Blockchain technology (BCT) enables the building of a distributed decentralized network that securely stores and exchanges unchangeable data, controlled by individual users. In healthcare, BCT may help streamline interoperability and information transmission while guaranteeing medical record authenticity and safeguarding patient privacy. Possible applications in radiology include patient-controlled image sharing, facilitation of multiinstitutional research, and artificial intelligence integration.

View Article and Find Full Text PDF

Secure IoT data dissemination with blockchain and transfer learning techniques.

Sci Rep

January 2025

Torrens University Australia, Fortitude Valley, QLD 4006, Leaders Institute, 76 Park Road, Woolloongabba, QLD 4102, Brisbane, Queensland, Australia.

Article Synopsis
  • Streaming IoT data is crucial for building trust in sustainable IoT solutions, but current systems often face issues with reliability, security, and transparency due to their centralized structures.
  • The research introduces TraVel, a framework that uses blockchain and transfer learning to improve the security of IoT data management, utilizing decentralized IPFS for data storage and a private Ethereum blockchain for enhanced data integrity.
  • TraVel implements self-executing smart contracts for access control and uses an adversarial domain adaptation model to filter out malicious data, ensuring only validated data is stored, with successful performance shown in simulations.
View Article and Find Full Text PDF

With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management. However, this also poses challenges related to data privacy breaches and holdership threats. Typically, blockchain technology and cloud storage provide effective solutions.

View Article and Find Full Text PDF

Sybil Attack-Resistant Blockchain-Based Proof-of-Location Mechanism with Privacy Protection in VANET.

Sensors (Basel)

December 2024

Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea.

In this paper, we propose a Proof-of-Location (PoL)-based location verification scheme for mitigating Sybil attacks in vehicular ad hoc networks (VANETs). For this purpose, we employ smart contracts for storing the location information of the vehicles. This smart contract is maintained by Road Side Units (RSUs) and acts as a ground truth for verifying the position information of the neighboring vehicles.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!